CompTIA Cloud+: Cloud Security Controls
CompTIA Cloud+
| Intermediate
- 16 videos | 1h 42m 38s
- Earns a Badge
There are certain security controls that all network administrators must know in order to protect their valuable systems and data. In this course, explore cloud security controls, beginning with endpoint protection, data loss prevention (DLP), intrusion prevention and detection systems (IPS/IDS), and distributed denial-of-service (DDoS) protection. Next, examine cloud firewalls, web application firewalls (WAFs), network security groups, network segmentation, and network protocols. Finally, learn about network services, flow analysis and event monitoring, identity and access management (IAM) policies, and how to create subnets in a cloud virtual network. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline endpoint protection and its relevance in cloud computingRecognize the role of data loss prevention (dlp) and how it's utilized in cloud computingDescribe intrusion prevention and detection systems (ips/ids) and why they must be implemented in cloud systemsOutline distributed denial-of-service (ddos) and why protecting against ddos is a necessary component of cloud computingIdentify the key characteristics of cloud firewalls and the various firewall options availableRecognize the purposes of web application firewalls (wafs) in cloud computing environmentsCreate network security groups (nsgs), an important component in cloud computing protection
-
Outline how to secure a network in a cloud environment using network segmentationIdentify how to use network protocols to secure a network in a cloud environmentRecognize how to secure a network in a cloud environment using network servicesDescribe how to monitor the security of a network environment using log and event monitoringImplement identity and access management (iam) policies in a cloud environmentOutline how subnets are used to create additional layers of protection in cloud computing environmentsCreate a virtual network in the cloud and segment it by adding subnetsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 4sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 48sUpon completion of this video, you will be able to outline endpoint protection and its relevance in cloud computing. FREE ACCESS
-
7m 12sThrough this video, you will be able to recognize the role of data loss prevention (DLP) and how it's utilized in cloud computing. FREE ACCESS
-
7m 8sAfter completing this video, you will be able to describe intrusion prevention and detection systems (IPS/IDS) and why they must be implemented in cloud systems. FREE ACCESS
-
5m 36sIn this video, we will outline distributed denial-of-service (DDoS) and why protecting against DDoS is a necessary component of cloud computing. FREE ACCESS
-
6m 45sUpon completion of this video, you will be able to identify the key characteristics of cloud firewalls and the various firewall options available. FREE ACCESS
-
7m 39sThrough this video, you will be able to recognize the purposes of web application firewalls (WAFs) in cloud computing environments. FREE ACCESS
-
5m 56sDiscover how to create network security groups (NSGs), an important component in cloud computing protection. FREE ACCESS
-
7m 37sAfter completing this video, you will be able to outline how to secure a network in a cloud environment using network segmentation. FREE ACCESS
-
6m 58sIn this video, we will identify how to use network protocols to secure a network in a cloud environment. FREE ACCESS
-
5m 59sThrough this video, you will be able to recognize how to secure a network in a cloud environment using network services. FREE ACCESS
-
5m 23sUpon completion of this video, you will be able to describe how to monitor the security of a network environment using log and event monitoring. FREE ACCESS
-
12m 34sLearn how to implement identity and access management (IAM) policies in a cloud environment. FREE ACCESS
-
8m 26sAfter completing this video, you will be able to outline how subnets are used to create additional layers of protection in cloud computing environments. FREE ACCESS
-
6m 41sDuring this video, discover how to create a virtual network in the cloud and segment it by adding subnets. FREE ACCESS
-
54sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.